Skip to main content

Search site

Find podcasts, news, articles, webinars, and contributors in one search.

Palo Alto Networks to fix exploited GlobalProtect zero-day

Source: The Register

Found this useful? Share it with your network

Palo Alto Networks issued a critical alert on Friday for a command-injection vulnerability in its PAN-OS software, affecting firewall and VPN products, with a CVSS severity score of 10/10, allowing unauthenticated attackers to execute remote code with root privileges. Updates are expected by Sunday, April 14. The vulnerability, designated CVE-2024-3400, affects certain configurations and is currently being exploited, as detected by Volexity, which observed the attacks aiming to take control of the equipment and penetrate victims' networks. Palo Alto Networks is actively working on a fix and has recommended temporary mitigations, emphasizing the importance of customer security and urging users to apply these measures promptly.

Read Full Article

Opens on The Register